Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:17
Yeah.
00:44
Hi, everyone.
00:48
Welcome to the open source Intelligence Fundamentals Course by Sai Buri. My name is Tina Shock each and I'll be your host for this fun and hopefully interesting course. But before we continue, please allow me to tell a little bit of by myself, as I always say in any of my security trainings.
01:03
I think it's my obligation to to let you know who I am. And I am I at least credible to talk about this topic
01:10
because you will probably do a little bit of Austin on me.
01:14
As I mentioned, my name is Tina Shock Itch.
01:17
I am a cybersecurity professional from Croatia, Europe.
01:21
I have over 10 years of fighting experience, professionally speaking, and by that I mean that I make a living out off working in the I T sector for over 10 years now.
01:30
I went to law school but decided to involve professionally into with i T. And one of the reasons was that I was into computers since I was a kid. When I say I'm in, I t I always point out that I'm not a programmer or developer, rather a systems engineer.
01:47
I grew up professionally with switches, cabling, fireball server system rooms, data centers.
01:53
I worked and still work on various certifications like Cisco, Microsoft, my critic and finished. Lots of trainings and seminars in regard to cybersecurity also went for various NLP neuro linguistic programming trainings and psychotherapy stuff which helped me in my social engineering studies
02:12
and open source intelligence was always involved
02:15
even before when I didn't have a name for it. I used various techniques and methods to get information so I could make an informed decision about something
02:25
besides career stuff. I enjoyed reading, running, singing and guitar playing. But one of the things that I especially like doing is legal email fish tests for my customers, which involves ah, lot of a lot of social engineering.
02:43
The picture in the slide is related to fishing, not real catching off the fish. I also dio live physical social engineer tests like pretending to be a new new employees in a company. But I won't bother you with that now. Now that we have met, we can start the course and the first thing I would like to point out are prerequisites
03:02
which in my opinion, would be beneficial for you to have to understand everything so you could go easier in your further studies concerning the open source intelligence.
03:12
If you read the newspapers or you serve the Internet, then you already have all the prerequisites for discourse. But I have divided this into two sections for which I mean are the most relevant for discourse, what to know and what tohave.
03:27
So let's proceed with the what to know part.
03:30
It would be highly recommended and appreciated that you are familiar with the basic terminology and the concept
03:37
that also includes cybersecurity. Since Austin, it is very much involved in the cybersecurity framework.
03:44
In my personal example, I come from the technical side off I t. And I'm very much interested in the technical side of Austin. It is easier to understand the concepts when you know the basics, how things work, literally basic things like, How does the Internet work and why does it look
04:01
the way it looks and so on
04:04
Next would be Lennox and Lennox like operating systems, since many tools which we will mention and show our developed toe work on that kind of operating systems, there are great resource is on Sai Buri for you to check out. Then there is
04:19
python. And yes, I have mentioned that I'm not a programmer, but knowing basics off any programming language can only be a plus.
04:27
And since we are involved in cybersecurity, Python is the right language.
04:32
Python is very popular in the cybersecurity community and because of its human friendly syntax and ease of use. It is a great and powerful language, and most of the old sent tools are written in that programming language.
04:46
Also, please check out the basic python course on Sai Buri. The question. What to have
04:51
from a hardware perspective? You need a computer and a smartphone and, of course, on active Internet connection, which allows you to acquire all these beautiful information and data. And, lastly, your curiosity and imagination, because your investigations are limited only by your mind.
05:10
And since there are numbers ways to learn about your target,
05:14
you will use your imagination to get to them.
05:17
When I mentioned territory inside, I have to say that for this course that is quite wide.
05:24
Actually, the topic off open source intelligence is a big one, but I have no narrative down, and I would list the potential audience as following
05:32
I t. And cybersecurity professionals would be my first pick because I'm an I t. Guy.
05:39
Then I would mention law enforcement and military personnel. Ah, big part off their work is based on intelligence that they gather and make important decisions based on that information.
05:50
Then there would be companies and their employees. Besides security teams, I would like to mention human resource is and you will see later in the course. Why did I put an emphasis on them?
06:02
Then there are journalists, private investigators, parents and teachers. Actually here I would like to put an emphasis on parents and teachers because I really encourage them to use this kind of knowledge to protect our youngest.
06:16
In many households, Children know more about the Internet and its usage than the adults, and that poses a problem. They're in a position to potentially hide their activity and content online. Lastly,
06:30
I'm aware that these techniques and tools can be used by anyone whose intense air malicious and, in a way, evil.
06:38
But that is the risk, like with any knowledge out there. So please don't be militias. If you were wondering why, you should even take this course, I will try to tell you now
06:47
there are a handful of reasons why you should want to learn about open source intelligence, especially if you're in the cybersecurity profession and the community.
06:57
Some of the reasons outlined here our knowledge.
07:00
If you like to learn new and exciting things, then you're already involved with cybersecurity. Then you're on the right track. This is an opportunity to expand your expertise and advance your career with the usage of Austin knowledge
07:15
and the No House. Believe me, the amount off knowledge that you are going to come across could easily overwhelm you because there are many different technologies involved in the open source intelligence process. Next would be defense and protection.
07:30
Learn to protect yourself and your organization because all the information and data that you confined via the Olsen tools and techniques, the bad guys can also find them and use them. And third fund,
07:44
I have to tell you the truth. Austin is a real fun ride, but at the same time it is quite scary. People, right share records sent enormous amounts of data and most of the times without even knowing that they're doing it, and all of the data is publicly available.
08:00
Also, one of the reasons is the lack of awareness and the feeling of false security.
08:05
Here is where you come to play and have a chance to enhance the overall cybersecurity posture off a person or an organization and have fun along the way.
08:15
Now we're going to do a little course or of you.
08:18
After this introduction will module number one in which which we are still in we're going to move on to model module number two called Theory,
08:28
and I'm very sorry about that, but we have to start with the definitions part, all jokes aside and model to first. We will try to put a label on opera source intelligence, actually define it. It's types, its usage and the ethics behind it.
08:43
Then we will move on to the module number three, which I called the innocent playground. And here we will start to prepare our environment for secure and efficient oh, stint investigations.
08:56
The next module, number four tools and techniques is probably one of the modules you are most interested in, and I agree it is interesting, but we need a good preparation to be successful and efficient with these tools
09:11
because there are a lot of them out there and we will go through ones which I think are most relevant for doing a basic coast in the investigation.
09:18
Then, in module number five, I will talk about sock puppets, which is one of my favorite terms innocent. And I won't spoil the fun by telling you what it is now after that will brush on the innocent defense in the module. Six. Actually, when I say awesome defense, I mean on operational security or op Sack,
09:37
in which we will go over how to protect yourself or your organization.
09:43
Plus, to show you a little and pretty simple examples how people actually share their information all over, probably without any awareness that they're actually doing it. And in the last module number seven, we will conclude our own fundamentals course journey with a few recommendations. Where to go next.
10:03
Throughout the course, I will show you how to use some of the tools and techniques that we're going to discuss. Also, don't forget to check out the resource is section off this course for additional information
10:13
in this introduction module number one. You got to know me, your host for the discourse. Then we talked about the prerequisites target audience. We try to answer the question why you should even take this course. And in the end, we did a quick overview of the topics that we're going to discuss.
10:31
Now let's move on to our second module called theory. So see you in the next video.
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By